scholarly journals A new method to detect attacks on the Internet of Things (IoT) using adaptive learning based on cellular learning automata

ETRI Journal ◽  
2021 ◽  
Author(s):  
Javad Dogani ◽  
Mahdieh Farahmand ◽  
Hassan Daryanavard
Telecom IT ◽  
2020 ◽  
Vol 8 (1) ◽  
pp. 55-66
Author(s):  
M. Efimov ◽  
R. Kirichek

Research subject. Adaptive systems in the concept of the Internet of things. Objective. To analyze and present the capabilities of adaptive systems in relation to the eco-system of the Internet of things. Method. In addition to the scientific approach, graph (network) and algebraic methods are used in the work, as well as methods of complex analysis. Core results. The use of adaptive systems will make it possible to predict the values of environmental parameters and perform a series of actions without user intervention. As a result of this adjustment, the system becomes adaptive, learning and adapting to changes in the environment, or to the modes of the commands given. Practical relevance. The article presents an analysis of systems and provides examples of the use of adaptive systems.


Author(s):  
Vishesh Jakhar

Abstract: Man-made consciousness innovations are starting to be effectively utilized in human existence, this is worked with by the appearance and wide scattering of the Internet of Things (IOT). Independent gadgets are becoming more intelligent in their manner to communicate with both a human and themselves. New limits lead to making of different frameworks for mix of savvy things into Social Networks of the Internet of Things. One of the important patterns in man-made brainpower is the innovation of perceiving the normal language of a human. New experiences in this theme can prompt new method for normal humanmachine cooperation, in which the machine would figure out how to comprehend human's language, changing and connecting in it. One of such devices is voice associate, which can be incorporated into numerous other shrewd frameworks. In this workshop, the standards of the working of voice collaborators are depicted, its principle weaknesses and restrictions are given. The strategy for making a neighborhood voice colleague without utilizing cloud administrations is depicted, which permits to altogether grow the pertinence of such gadgets later on.


2013 ◽  
Vol 380-384 ◽  
pp. 2431-2434
Author(s):  
Yang Yang ◽  
Xiao Wen ◽  
Peng Tang ◽  
Fang Yi Liu

With the development of the Internet of Things, collected data from the Internet of Things include more and more incomplete data because of the network fault or the sensing terminal breakdown. A lot of incomplete data do harm to the IoT application and decision. For filling the incomplete data in IoT effectively, this paper presents a new method based on power graph, which first uses the graph power to abstract the important attributes of the objects. Then the proposed method fills the important attributes using improved method based on similarity. Experimental results show the effectiveness of our method, especially for filling the massive incomplete data in IoT.


2021 ◽  
Author(s):  
Peilin Chen

Abstract Energy consumption management and optimal use of node resources are key elements in the Internet of Things. In this study, a framework based on cognitive topology control that acts based on the LR−I learning automata and game on it, has been used to control power, channel and contention windows and to create preventive behavior in the network. Due to the limitations of nodes in the Internet of Things, the transfer of learning automata processing to the cloud, fog and edge has been investigated to increase lifespan, reduce memory consumption and increase processing power. The communication was done based on IPv6 protocol and IEEE 802.15.4 standard. The nodes also used the uIP lightweight protocol stack and the RPL lightweight routing protocol. In order to use the sixth version of the Internet Protocol in the IEEE 802.15.4 standard platform, the 6LoWPAN protocol has been used to compress and convert headers. Computing on fog nodes has also been used to perform game calculations on automata. Finally, the Cooja simulator was used in the Contiki operating system to evaluate the efficiency of the proposed method, which showed the superiority of the proposed method in energy consumption, memory usage and processing power compared to other methods that control power and channel.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


Sign in / Sign up

Export Citation Format

Share Document